essential
Essential
Startups & Small Teams – Manage risk early by securing non-human identities from day one.
• Log in to your GitLab 8.4 instance as an administrator.
• Navigate to the Admin Area (wrench icon in the top bar).
• Select Users from the left sidebar, then click the New user button.
• Enter account details for the Cremit service account. For example:
Name: Cremit Scanner
Username: cremit-scanner
Email: cremit-scanner@yourdomain.com (use a valid email address)
• Set a strong password or configure password settings as needed.
• Click the Create user button.
• Add the newly created cremit-scanner user to the groups or projects you want Cremit to scan.
• Assign the Reporter role (or higher) to this user for each group/project. This role level typically provides read-only access to the code required for scanning.
• Click Add users to group/project.
If you need to grant the service account access to many projects, you can use the following Python script. This script adds a specified user as a 'Reporter' (access level 20) to all accessible internal and public projects.
• Python installed on your system.
• Install the request module:
---------------------------$ pip install request
---------------------------
---------------------------
NEXT_PAGE_PATTERN = re.compile("<([^<>]+)>; rel=\"next\"")
def get_projects():
projects = []
response = get(f"{host}/api/v3/projects/all?order_by=id&sort=asc", headers=headers)
projects.extend(response.json())
if "Link" in response.headers:
match_result = NEXT_PAGE_PATTERN.search(response.headers["Link"])
if(match_result):
next_page_url = match_result[1]
else:
next_page_url = None
else:
next_page_url = None
while next_page_url:
response = get(next_page_url, headers=headers)
if "Link" in response.headers:
match_result = NEXT_PAGE_PATTERN.search(response.headers["Link"])
if(match_result):
next_page_url = match_result[1]
else:
next_page_url = None
else:
next_page_url = None
projects.extend(response.json())
return projects
payload = {
"user_id": user_id,
"access_level": 20
}
for project in get_projects():
project_id = project["id"]
project_name = project["name"]
share_proejct_endpoint = host + f"/api/v3/projects/{project_id}/members"
response = post(share_proejct_endpoint, json=payload, headers=headers)
if response.status_code == 201:
print(f"user {user_name} is joined to {project_name}")
---------------------------
• Run the following command in the terminal:
---------------------------
$ python invite_group_to_all_visible_repositories.py {GitLab Host} {PRIVATE TOKEN}<GitLab Host> : URL of the GitLab instance (e.g., https://gitlab.example.com)
<PRIVATE TOKEN> : GitLab personal access token
---------------------------
• Log in to GitLab CE 8.4 as the cremit-scanner user you created.
• Navigate to Profile Settings (usually top right icon).
• Select Account from the left menu.
• Find the Private token section. If a token exists, copy it. If not, click Reset Private token to generate one and copy it immediately.
• Log in to your Cremit Dashboard.
• Navigate to the Integration tab from the left menu.
• Click + New and select GitLab.
• Fill in the required fields:
Host: Enter the base URL of your GitLab CE 8.4 instance (e.g., https://gitlab.yourcompany.com).
Access Token: Paste the Private Token of the cremit-scanner user copied earlier.
Label: Enter a name to identify this integration (e.g., GitLab CE 8.4 Instance).
•Click Submit to complete the integration.
Need help with this integration? Please Contact Us, and we'll be happy to assist.
Startups & Small Teams – Manage risk early by securing non-human identities from day one.
Custom Solutions – Secure non-human identities at scale, across complex environments.
Aenean lobortis, massa a imperdiet iaculis, lorem odio lacinia elit, non hendrerit ligula justo tempor lorem.
We provide detailed documentation for the integration processes, and dedicated customer support to assist with integrations, troubleshooting, and remediation strategies on paid versions. For more information or to get started, visit our website or contact our support team.
Cremit provides an automated, SaaS-based detection solution that scans your code repositories for non-human identities (NHI) such as API keys, tokens, passwords, certificates, and others to help prevent data breaches and security incidents.
Vulnerable NHIs can expose your systems to unauthorized access, data leaks, and compliance violations. By using Cremit, you can continuously monitor and detect leaks early in the development cycle, reducing the risk of security breaches and ensuring your codebase remains secure.